Remove 07
article thumbnail

Comodo Antivirus is affected by several vulnerabilities

Security Affairs

The most severe flaw, tracked as CVE=2019-3969, could be exploited by an attacker with access to the target system to escape the Comodo Antivirus sandbox and escalate privileges to SYSTEM. The remaining issue could be exploited by an attacker with access to the target system to trigger a DoS condition in the kernel and other components.

Access 74
article thumbnail

3.4 Million user records from LiveAuctioneers hack available for sale

Security Affairs

The company confirmed the security breach over the weekend, it revealed that unknown threat actors accessed a partner’s systems in June stealing user information. Our cybersecurity team has ensured the unauthorized access has ceased.” Financial data, including credit card numbers, were not accessed by the hackers.

Sales 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Garmin allegedly paid for a decryptor for WastedLocker ransomware

Security Affairs

Now BleepingComputer confirmed the malware family involved in the attack was the Wastedlocker ransomware after it has gained access to an executable created by the Garmin IT department to decrypt a workstation. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Garmin did not comment the story.

article thumbnail

Zero-day vulnerability in Android OS yet to be patched

Security Affairs

Experts pointed out that the attackers need local access in order to exploit the vulnerability, this means they should have already compromised the device. Experts warn of the severity of privilege escalation vulnerabilities that could be used by attackers to gain root access on the devices and carry out many malicious activities.

Access 76
article thumbnail

CVE-2019-15846 Exim mail server flaw allows Remote Code Execution

Security Affairs

Possible mitigation consists of configuring the server to not accept TLS connections, but it is not recommended or adding rules to the access control list (ACL). Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Researchers from Qualys have developed a proof-of-concept (PoC) exploit code for the flaw.

Access 82
article thumbnail

wget utility potential leaked password via extended filesystem attributes

Security Affairs

The attributes could be accessed on any logged-in machine using the getfattr command. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. ” Böck wrote.

article thumbnail

Experts disclose security flaws in Oracle’s iPlanet Web Server

Security Affairs

The first issue, tracked as CVE-2020-9315 , could allow unauthenticated remote attackers to gain read-only access to any page within the administration console, without authentication, by simply replacing an admin GUI URL for the target page. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.